Behavioral task
behavioral1
Sample
LockBit30/Build.bat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
LockBit30/Build.bat
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
LockBit30/builder.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
LockBit30/builder.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
LockBit30/keygen.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
LockBit30/keygen.exe
Resource
win11-20241007-en
General
-
Target
LockBit30.zip
-
Size
290KB
-
MD5
00fd93c769694a0b90b2a8ff7af22507
-
SHA1
6916bcd30b8eac17ad5f3c99b8c98a3d405ffabc
-
SHA256
7435f2c3f32ab84e2e575a627f418ce39e806ce59a3ad43e481d179deb88e500
-
SHA512
2e8b00f63743bc43b4572b610fa5a97b2e15af45e11bfe8869ec41d65301db5f6ab5618d9186dfb83b13dfe02a4eeb55bce479d1be6750c2152c9b2cfa76a469
-
SSDEEP
6144:CN8M9xcI7tZ4ApPZSQQWzl/jhc83syii9mWjXqpNUvupvobLm3gXTix9a:68M9OIEAFoQQWz9hcVhWrqLUvu9o/XXh
Malware Config
Extracted
blackmatter
25.239
Signatures
-
Blackmatter family
-
Lockbit family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/LockBit30/builder.exe family_lockbit -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/LockBit30/builder.exe unpack001/LockBit30/keygen.exe
Files
-
LockBit30.zip.zip
-
LockBit30/Build.bat
-
LockBit30/builder.exe.exe windows:5 windows x86 arch:x86
d2e26e45dcb84f1062f90f29a9cf0faa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxW
kernel32
LoadResource
WriteFile
CreateFileW
ExitProcess
FindResourceW
GetCommandLineW
GetFileSize
GetModuleHandleW
GlobalFree
SizeofResource
LockResource
ReadFile
shell32
CommandLineToArgvW
msvcrt
_wcsicmp
memcpy
memset
sprintf
strchr
strcpy
strlen
strstr
wcscat
wcscpy
wcslen
wcsrchr
localeconv
_stricmp
_strcmpi
tolower
realloc
malloc
free
strtod
strncmp
imagehlp
CheckSumMappedFile
ntdll
RtlFreeHeap
RtlAllocateHeap
NtClose
RtlImageNtHeader
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 438KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
LockBit30/config.json
-
LockBit30/keygen.exe.exe windows:5 windows x86 arch:x86
73eeda700d0a0376845c61c44155f4a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
kernel32
GetCurrentDirectoryW
WriteFile
CloseHandle
CreateFileW
ExitProcess
GetCommandLineW
GlobalFree
SetCurrentDirectoryW
shell32
CommandLineToArgvW
msvcrt
_wcsicmp
memcpy
memset
free
fputc
exit
calloc
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE